Webinar: Running a fuzzing tool in OP-TEE

Visit Website

Linaro and Riscure will host a webinar on a fuzzing tool Riscure has created, using OP-TEE as the use case.

Webinar: Running a fuzzer in OP-TEE

We are pleased to announce that on Tuesday 3 December 2019, Linaro together with Riscure will host a webinar on fuzzing in OP-TEE.

Presenter: Martijn Bogaard, Senior Security Analyst at Riscure

Moderator: Joakim Bech, Principal Engineer, Security Working Group at Linaro

Date: Tuesday 3 December 2019

Time: 6pm - 7pm GMT

Register here: http://bit.ly/2XPrCvl


Abstract:

Trusted Execution Environments (TEEs) have an increasing role in the security of embedded systems and one of the leading open-source solutions is OP-TEE by TrustedFirmware.org. As more and more security-critical tasks are moved to the TEE, the complexity and thus risk of vulnerabilities increases as well. Nowadays, all TEE’s run a small operating system where services to Trusted Applications are exposed through a system call interface.

In this webinar, Martijn Bogaard, Senior Security Analyst at Riscure will talk about a fuzzing framework he has created for trusted operating systems, looking specifically at OP-TEE.

Martijn will discuss the challenges of fuzzing a TEE running on an actual device as well as Riscure’s approach that allows the use of an unmodified version of AFL running as a Linux application in the non-secure world. Additionally, he will talk about the useful set of initial inputs Riscure have created to seed AFL, latest improvements to the framework and some of the issues found as a result of fuzzing OP-TEE.

There will be time at the end of the webinar to ask questions and a video recording will be made available to those unable to attend.

If you have any questions please email marketing@linaro.org.

Hope to see you there!

最近的帖子

    其他帖子